2.1
CVSSv2

CVE-2020-29562

Published: 04/12/2020 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 4.8 | Impact Score: 3.6 | Exploitability Score: 1.2
VMScore: 189
Vector: AV:N/AC:H/Au:S/C:N/I:N/A:P

Vulnerability Summary

It exists that the GNU C Library nscd daemon incorrectly handled certain netgroup lookups. An attacker could possibly use this issue to cause the GNU C Library to crash, resulting in a denial of service. This issue only affected Ubuntu 20.04 LTS. (CVE-2021-27645)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc

fedoraproject fedora 32

netapp e-series santricity os controller

Vendor Advisories

Debian Bug report logs - #976391 glibc: CVE-2020-29562 Package: src:glibc; Maintainer for src:glibc is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 4 Dec 2020 14:06:02 UTC Severity: important Tags: security, upstream Found in versions glibc/2 ...
Several security issues were fixed in GNU C Library ...
The iconv program in the GNU C Library (aka glibc or libc6) 231 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service (CVE-2016-10228) A flaw was found in glibc When pro ...
The iconv function in glibc 230 to 232, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service ...